MobileWare, Inc. | Your Enterprise Mobility Management Partner

  Call Us 866.850.7682 | info@mobilewareus.com | Login

Tag - cybersecurity

19
Feb

How to Have Responsible IoT Security

Enterprise adoption of the Internet of Things (IoT) has increased efficiencies and produced amazing amounts of data. More data means businesses can leverage information to be faster and more profitable than their competitors. However, before leaping head first into IoT adoption and digital transformation, enterprises need to be strategic about purpose, use and most of …

29
Jan

The Increasing Shortage of Cybersecurity Professionals

While cybersecurity professionals earn a decent salary, averaging $95,000 a year, there is a sharp shortage available in the workforce. To be exact, there is a shortfall of about 40 percent in the U.S. alone with the shortfall increasing to 3 million positions worldwide. As businesses continues to digitize for efficiencies, they step further into …

15
Jan

Increase Cloud Security in a Shared Responsibility Model

Enterprises are accelerating the pace at which they are moving workload to cloud computing solutions. Cloud computing provides a greater cost, scale and speed advantage. However, cloud security remains a concern for enterprises. Especially since both Amazon’s AWS and Microsoft’s Azure follow a Shared Responsibility Model. A Shared Responsibility Model is designed for the vendor …

6
Nov

Multi-threading Security Threat: PortSmash

There has been an ever-increasing need for CPUs, both commercial and consumer, to perform faster. In order to do so, certain aspects have been built into processors. While increasing performance, multithreading and speculative execution have left CPUs and networks around the world at risk. Unlike the speculative execution risk of Spectre and Meltdown, a multi-threading …

16
Oct

Security Protocols: No One is Immune

This past week has been a rough week for cybersecurity in the Pentagon. Not only did the Pentagon fail in their weapons program security protocols, but the Pentagon has announced a data breach affecting over 30,000 DOD employee records. So, where did the Pentagon fail in security protocols? And what lead to the data breach? …

28
Aug

Security Monitoring: Walls Aren’t Enough

Once again, we are reminded the importance of cybersecurity on multiple levels. The news that big tech companies have intercepted not only Russian, but Iranian influence campaigns, should make all executives question the security monitoring of their own companies. Regardless if the company is large or small, IoT and mobility has continued to flood servers …

10
Jul

Security: We Bet You Are Making One of These Mistakes

Cybersecurity is important for any business to focus on, as cybercrime continues to escalate. The average data breach costs $7.35 million dollar, a 5% increase in 2017 over the previous year. That is an average of $225 per lost or stolen record. Think about how many records your business stores and how costly a lack …

20
Jun

Cybersecurity: What You Don’t Know About Your Risks

Cybersecurity is a big-ticket item for any business. As more data breaches occur, businesses need to focus on security needs. Cybercrime is escalating, with the US experiencing an average of 22% increase in data breaches in 2017. However, most businesses do not have the appropriate budget assigned for security risks. Nor is money allocated into …

29
May

Scareware: A Silent Form of Hacking

It can happen to anyone, any time. A user are browsing on the internet, for work or for pleasure, when suddenly a box pops up. A virus has infected your computer and call the support number immediately. Scareware has just attacked you. The box can include anything from the browser logo to the logo of …

16
Jan

Meltdown and Spectre: Is Your Security at Risk?

Last week Las Vegas hosted the International Consumer Electronics Show. Although a technology conference focused on the biggest and brightest tech for consumers, security took center stage this year. Namely, manufacturers attempted to answer some questions about the Meltdown and Spectre vulnerabilities. Though the vulnerabilities were discovered mid- last year, the processor weakness that affects …